CVE-2022-49095
📋 TL;DR
This CVE describes a memory resource leak vulnerability in the Linux kernel's zorro7xx SCSI driver. When the driver's remove function is called, it fails to properly release memory-mapped I/O resources that were allocated during probe, potentially leading to kernel memory exhaustion. This affects Linux systems using the zorro7xx driver, primarily on Amiga Zorro bus hardware.
💻 Affected Systems
- Linux kernel
📦 What is this software?
Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →⚠️ Risk & Real-World Impact
Worst Case
Sustained exploitation could lead to kernel memory exhaustion, causing system instability, denial of service, or kernel panic.
Likely Case
Memory leak gradually consumes kernel resources, potentially leading to system performance degradation or instability over time.
If Mitigated
With proper kernel memory management controls and monitoring, impact is limited to potential performance issues.
🎯 Exploit Status
Exploitation requires local access and ability to trigger the driver's remove function. No known public exploits.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Fixed in kernel commits: 16ed828b872d12ccba8f07bcc446ae89ba662f9c, 1e0c01319dedf1e63ec5df37ead048e17afd92ba, 34a47f7ddb4fd1cbd12397aa6f7dad1de08b4050, a845c678e094894f38cc9526d212b21933ce44c7, aefd755a96051aa56b198cb7ecd168b22ba384f6
Vendor Advisory: https://git.kernel.org/stable/c/16ed828b872d12ccba8f07bcc446ae89ba662f9c
Restart Required: Yes
Instructions:
1. Update Linux kernel to version containing the fix commits. 2. Check your distribution's security advisories for backported patches. 3. Reboot system to load patched kernel.
🔧 Temporary Workarounds
Unload zorro7xx module
linuxRemove the vulnerable kernel module if not needed
sudo rmmod zorro7xx
Blacklist zorro7xx module
linuxPrevent the module from loading automatically
echo 'blacklist zorro7xx' | sudo tee /etc/modprobe.d/blacklist-zorro7xx.conf
🧯 If You Can't Patch
- Monitor kernel memory usage for unusual patterns
- Restrict local user access to systems using zorro7xx driver
🔍 How to Verify
Check if Vulnerable:
Check if zorro7xx module is loaded: lsmod | grep zorro7xx
Check Version:
uname -r
Verify Fix Applied:
Check kernel version includes fix commits or verify module is not loaded
📡 Detection & Monitoring
Log Indicators:
- Kernel oom-killer messages
- System instability logs
- Memory pressure warnings
Network Indicators:
- None - this is a local kernel issue
SIEM Query:
Search for kernel panic logs or memory exhaustion events on systems with zorro7xx driver
🔗 References
- https://git.kernel.org/stable/c/16ed828b872d12ccba8f07bcc446ae89ba662f9c
- https://git.kernel.org/stable/c/1e0c01319dedf1e63ec5df37ead048e17afd92ba
- https://git.kernel.org/stable/c/34a47f7ddb4fd1cbd12397aa6f7dad1de08b4050
- https://git.kernel.org/stable/c/a845c678e094894f38cc9526d212b21933ce44c7
- https://git.kernel.org/stable/c/aefd755a96051aa56b198cb7ecd168b22ba384f6
- https://git.kernel.org/stable/c/c5f77b595379b5191316edd365a542f8b1526066
- https://git.kernel.org/stable/c/ce430cfad6a5385d5b7f7c1dc3fa50f10abfd41b
- https://git.kernel.org/stable/c/db863ab2baf058ed05c7b723612e3c40c9dd6885
- https://git.kernel.org/stable/c/de6aee0978f164d3d0c771ce03e3066a26c371c5